Exam 1: Network Security Fundamentals

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a program that appears to do something useful but is actually malware?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

C

What can an attacker use a port scanner to test for on a target computer?

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

C

Discuss scripting and how it relates to network security.

Free
(Essay)
4.9/5
(33)
Correct Answer:
Verified

A widespread network intrusion that is increasing in frequency and severity is the use of scripts-executable code attached to e-mail messages or downloaded files that infiltrates a system.It can be difficult for a firewall or intrusion-detection system (IDS)to block all such files; specialty firewalls and other programs should be integrated with existing security systems to keep scripts from infecting a network.

MATCHING -Computer files that copy themselves repeatedly and consume disk space or other resources

(Multiple Choice)
4.9/5
(31)

MATCHING -The process of recording which computers are accessing a network and what resources are being accessed,and then recording the information in a log file

(Multiple Choice)
4.8/5
(27)

MATCHING -A network connection consisting of a port number combined with a computer's IP address

(Multiple Choice)
4.8/5
(31)

Which type of firewall policy calls for a firewall to deny all traffic by default?

(Multiple Choice)
4.8/5
(35)

What is a VPN typically used for?

(Multiple Choice)
4.9/5
(40)

Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?

(Multiple Choice)
4.9/5
(29)

What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?

(Multiple Choice)
4.9/5
(38)

MATCHING -An area in random access memory (RAM)reserved for the use of a program that "listens" for requests for the service it provides

(Multiple Choice)
4.8/5
(30)

______________ do not require user intervention to be launched; they are self-propagating.

(Short Answer)
4.7/5
(37)

MATCHING -A method of authenticating a user using physical information,such as retinal scans,fingerprints,or voiceprints

(Multiple Choice)
4.7/5
(32)

Which term is best described as an attack that relies on the gullibility of people?

(Multiple Choice)
5.0/5
(28)

What is social engineering?

(Essay)
4.8/5
(32)

Discuss permissive versus restrictive firewall policies.

(Essay)
4.8/5
(43)

________________ events usually track the operations of the firewall or IDPS,making a log entry whenever it starts or shuts down.

(Short Answer)
5.0/5
(36)

Why might you want your security system to provide nonrepudiation?

(Multiple Choice)
4.7/5
(40)

Which of the following is NOT information that a packet filter uses to determine whether to block a packet?

(Multiple Choice)
4.8/5
(30)

In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?

(Multiple Choice)
4.9/5
(37)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)